CVE-2026-2168
Analyzed Analyzed - Analysis Complete
Remote Command Injection in D-Link DWR-M921 LTE Upgrade Function

Publication date: 2026-02-08

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in D-Link DWR-M921 1.1.50. This affects the function sub_419920 of the file /boafrm/formLtefotaUpgradeQuectel. This manipulation of the argument fota_url causes command injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-08
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-02-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
dlink dwr-m921_firmware 1.1.50
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-74 The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-2168 is a critical command injection vulnerability found in the D-Link DWR-M921 router firmware version 1.1.50. The flaw exists in the function sub_419920 within the /boafrm/formLtefotaUpgradeQuectel endpoint. This function processes the input parameter fota_url, which is intended to contain a URL starting with "http://", "https://", or "ftp://". However, the input validation is insufficient and does not properly sanitize or filter special characters before using the input to construct a shell command via sprintf. This allows an attacker to inject arbitrary commands into the system shell, leading to command execution on the device.'}, {'type': 'paragraph', 'content': 'The vulnerability can be exploited remotely by sending a specially crafted request to the vulnerable endpoint with a malicious fota_url parameter. The attack can be performed without user interaction and can execute commands with root privileges on the device.'}] [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability allows remote attackers to execute arbitrary commands on the affected D-Link DWR-M921 router with root privileges. This can compromise the confidentiality, integrity, and availability of the device and the network it is connected to.

  • Attackers can gain unauthorized control over the router.
  • Sensitive information on the device or network may be exposed or altered.
  • The router could be used as a foothold for further attacks within the network.
  • Service disruption or denial of service could occur if malicious commands affect device operation.

Exploitation is considered easy, and a proof-of-concept exploit is publicly available, increasing the risk of attacks.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to send crafted HTTP POST requests to the vulnerable endpoint `/boafrm/formLtefotaUpgradeQuectel` on the D-Link DWR-M921 router firmware version 1.1.50. The key is to test the `fota_url` parameter for command injection by including shell metacharacters after a valid protocol prefix such as "http://".'}, {'type': 'paragraph', 'content': 'A proof-of-concept approach involves authenticating to the router, then sending a POST request with a payload like `http://; ls -la` in the `fota_url` parameter to check if arbitrary commands can be executed.'}, {'type': 'paragraph', 'content': 'Example command using curl (assuming you have authenticated and have a valid session cookie):'}, {'type': 'list_item', 'content': 'curl -X POST -d "fota_url=http://; ls -la" http://<router-ip>/boafrm/formLtefotaUpgradeQuectel'}, {'type': 'paragraph', 'content': 'If the command injection is successful, the router will execute the injected command, which can be verified by observing the response or side effects.'}] [3]


What immediate steps should I take to mitigate this vulnerability?

There are no known fixes or patches available for this vulnerability as of the latest information.

Immediate mitigation steps include:

  • Restrict remote access to the affected router to trusted networks only, preventing unauthorized external access.
  • Disable or block access to the vulnerable endpoint `/boafrm/formLtefotaUpgradeQuectel` if possible via firewall rules or router configuration.
  • Monitor network traffic for suspicious POST requests targeting the vulnerable endpoint.
  • Consider replacing the affected device with a different model or vendor that is not vulnerable.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart